The State of the Consumerization of IT

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Previous Next

Click through for results from a survey on the consumerization of IT conducted by International Data Corp., on behalf of Unisys.

Everybody agrees that the consumerization of IT is happening; to what degree, nobody is quite sure.

Two new surveys of 2,660 information workers and 560 IT managers and executives, conducted by International Data Corp. on behalf of Unisys, find that while usage of personally owned devices is growing in the enterprise, these are still pretty much used to augment traditional usage of PCs. At the same time, the survey shows that social media is used primarily for marketing purposes.

Interestingly, workers give internal IT more credit for supporting these devices than IT managers, which suggests there is a lot of extracurricular support provided by IT staff.

But despite the proliferation of these devices, any plans to optimize existing applications for mobile computing devices remain in relative infancy.

More Slideshows:

Access to Enterprise Software from Mobile Devices Lagging Study finds that many are missing the productivity opportunities provided by mobile access to enterprise software.

June 2011 Spam and Phishing Report Spam at lowest level since the McColo takedown in November 2008.

Security Vulnerabilities at All-time Highs for Mobile Devices Mobile security recommendations for consumers and administrators.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

cloud5-190x128.jpg 5 Lessons to Brush Up Your Cloud Security Knowledge

Classes are officially in session. What better time than the start of a new school year to brush up on your cloud security knowledge? ...  More >>

infra58-290x195 IT Focus Shifting to New 'Smart' Technologies, BPM and Security

IT leaders and business executives are beginning to focus their eyes on new IT initiatives, including so-called "smart" technologies, as well as efforts to better integrate previous IT investments into the business. ...  More >>

cloud5-190x128.jpg How to Keep Your Cloud Technologies Secure

Just because a loss event hasn't happened yet doesn't mean you have immunity; no organization does. See how you can keep cloud technologies secure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Thanks for your registration, follow us on our social networks to keep up-to-date